机构作者

文献数量:1

文献数量:1

文献数量:1

文献数量:1

文献数量:2

文献数量:1

文献数量:1

文献数量:2

文献数量:1

文献数量:1

文献数量:2

文献数量:1

文献数量:1

文献数量:1

文献数量:1

文献数量:1
机构文献
Intelligent Information Network Security Management Strategy for Service Innovation of Manufacturing Enterprises Under Blockchain[J]
JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING
A Flexible Sharding Blockchain Protocol Based on Cross-Shard Byzantine Fault Tolerance[J]
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
IDENTIFY AND RANK THE CHALLENGES OF IMPLEMENTING SUSTAINABLE SUPPLY CHAIN BLOCKCHAIN TECHNOLOGY USING THE BAYESIAN BEST WORST METHOD[J]
TECHNOLOGICAL AND ECONOMIC DEVELOPMENT OF ECONOMY
Mitigation of block withholding attack based on zero-determinant strategy[J]
PEERJ COMPUTER SCIENCE
A Regulatable Blockchain Transaction Model with Privacy Protection[J]
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS
Investor attention and idiosyncratic risk in cryptocurrency markets[J]
EUROPEAN JOURNAL OF FINANCE